Results 51 to 60 of about 8,366 (124)
Advanced connectivity in substations brings along cybersecurity considerations. Especially, the use of standardized data objects and message structures stipulated by IEC 61850 makes them much more vulnerable to unauthorized access and manipulation.
T. Ustun, S. Hussain
semanticscholar +1 more source
The application and challenge of energy router in energy internet
Abstract The energy internet has emerged as a promising area of research in power systems with distributed generation. Similar to an internet router to connect and switch networks, the energy router within the energy internet plays a crucial role to integrate and distribute the energy flow.
Jinliang Huang +4 more
wiley +1 more source
Protection of AC and DC Microgrids: Challenges, Solutions and Future Trends [PDF]
In future, distributed energy resources (RESs) will be utilized at consumption points. As a consequence, power flow and fault current would be bidirectional and topologydependent; and hence the conventional protection strategies would be inefficient ...
Beheshtaein, Siavash +3 more
core +2 more sources
Enhanced authentication and device integrity protection for GDOI using blockchain
Our work addresses the problem of device‐level cyber‐attacks such as device identity theft and introduction of fake nodes in GDOI‐enabled smart grids. It introduces a permissioned blockchain based device authentication management in the GDOI phase 1 and periodic device integrity check in phase 2 to achieve decentralized authentication and device‐level ...
Munkenyi Mukhandi +3 more
wiley +1 more source
Power quality measuring system [PDF]
Tato práce se zabývá problematikou měření kvality elektrické energie. Budou rozebrány parametry, dle kterých se kvalita hodnotí, dále budou popsány systémy dálkového sběru dat a s nimi spojené technologie přenosu.
Valenta, Jaroslav
core
Основи інформаційної та кібернетичної безпеки та захисту інформації [PDF]
Робоча навчальна програма з курсу «Основи інформаційної та кібернетичної безпеки та захисту інформації» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі ...
Бурячок, Володимир Леонідович +1 more
core +1 more source
Стандарти безпеки та технології протидії кіберзлочинності [PDF]
Робоча навчальна програма з курсу «Стандарти безпеки та технології протидії кіберзлочинності» є нормативним документом Київського університету імені Бориса Грінченка, який розроблено кафедрою інформаційної та кібернетичної безпеки на основі освітньо ...
Борсуковський, Юрій Володимирович
core
Measurement re-ordering attacks on power system state estimation [PDF]
Power system state estimation is a prerequisite for detecting faults, directing power flows, and other tasks of Energy Management Systems. State estimators have conventionally filtered out so-called bad data or outliers, but in recent years a number of ...
Gul, Ammara, Wolthusen, Stephen
core +1 more source
A survey on smart grid communication infrastructures: Motivations, requirements and challenges [PDF]
A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive communication infrastructure is crucial in both construction and operation of a smart grid.
Qian, Y, Sharif, H, Tipper, D, Yan, Y
core +1 more source
(1) Background: This study aimed to analyze and rank the benefits of adopting Artificial Intelligence (AI) in the logistics area, considering the opinions of professionals working in the Brazilian logistics sector through the implementation of ISO/IEC ...
Alanna Oeiras da Costa Mazzinghy +9 more
semanticscholar +1 more source

